Writen by Piotr Marszalik - @addenial - peter.mars[at]outlook.com https://github.com/addenial/ps1encode
- orginal version - 05/08/2013
Available output types:
- raw (plaintext powershell payload only - no base64 encoding)
- cmd (for use with bat files)
- vba (for use with macro trojan docs)
- vbs (for use with vbs scripts)
- war (tomcat)
- exe (executable) requires MinGW - x86_64-w64-mingw32-gcc [apt-get install mingw-w64]
- go (golang executable) requires Golang - go [apt-get install golang-go]
- godll (golang dll) requires Golang, can be executed with bins like rundll32.exe
- java (for use with malicious java applets)
- js (javascript)
- js-rd32 (javascript called by rundll32.exe)
- php (for use with php pages)
- hta (HTML applications)
- cfm (for use with Adobe ColdFusion)
- aspx (for use with Microsoft ASP.NET)
- lnk (windows shortcut - requires a webserver to stage the payload)
- sct (COM scriptlet - requires a webserver to stage the payload)
Powershell code based on PowerSploit written by Matthew Graeber and SET by Dave Kennedy
Latest version using modified msfvenom psh-cmd template with added obfuscation (XOR shellcode, etc.)
DETAILS: